The image shows how a proactive and structured risk management mode evolved over time.

The accidental evolution of IT Risk Management

Ever wondered how we got to a point where cybersecurity is a boardroom topic and data breaches are news items? It wasn’t an overnight sensation, but a slow, often reactive evolution driven by technology’s relentless march forward. The story of IT risk management is fascinating, intrinsically linked to the very rise and spread of information technology itself. The Early Days: …

Continue Reading

Cryptography- The Core of Confidentiality

Have you read the novels “The case of the dancing men” by Sir Arthur Conan Doyle and “The Gold-bug” by Edgar Allen Poe? If not, please do so! Not only is reading good for your mind, but these two books will also give you a glimpse into the mind of a hacker. The hackers here are the protagonists of the …

Continue Reading
The image displays the two aspects of security, the virtual security vs real security

The heart of security in the virtual (and the real) world!

The world of information security revolves around three core pillars – Confidentiality, Integrity and Availability. This is known as the CIA triad. In simple words: Confidentiality is – “Who should know what and when”Integrity is – “Who can change what and when”, andAvailability is – “Who should get what and when”. This is clear in the context of cybersecurity. Take …

Continue Reading